{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:09:39Z","timestamp":1758845379807,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,6]],"date-time":"2019-12-06T00:00:00Z","timestamp":1575590400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,6]]},"DOI":"10.1145\/3374587.3374646","type":"proceedings-article","created":{"date-parts":[[2020,3,4]],"date-time":"2020-03-04T18:16:31Z","timestamp":1583345791000},"page":"48-53","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A Study of Ciphertext Fuzzy Retrieval Based on Information Matrix"],"prefix":"10.1145","author":[{"given":"Xiang","family":"Guangli","sequence":"first","affiliation":[{"name":"School of computer science and technology, Wuhan University of Technology, Wuhan, China"}]},{"given":"Chen","family":"Yan","sequence":"additional","affiliation":[{"name":"School of computer science and technology, Wuhan University of Technology, Wuhan, China"}]},{"given":"Shen","family":"Guancheng","sequence":"additional","affiliation":[{"name":"School of computer science and technology, Wuhan University of Technology, Wuhan, China"}]},{"given":"Tian","family":"Biao","sequence":"additional","affiliation":[{"name":"School of computer science and technology, Wuhan University of Technology, Wuhan, China"}]}],"member":"320","published-online":{"date-parts":[[2020,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","author":"Yang M","year":"2016","unstructured":"Yang M , Zhou X G , Zeng J Q , and Xu J J. 2016 . Challenges and solutions of information security issues in the age of big data, China Communications, No.03, pp.193--202, 2016. Yang M, Zhou X G, Zeng J Q, and Xu J J. 2016. Challenges and solutions of information security issues in the age of big data, China Communications, No.03, pp.193--202, 2016.","journal-title":"and Xu J J."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007632"},{"key":"e_1_3_2_1_3_1","first-page":"325","article-title":"Evaluating 2-DNF formulas on ciphertexts","author":"Dan B","year":"2005","unstructured":"Dan B , Goh E J , Nissim K , \" Evaluating 2-DNF formulas on ciphertexts \", Lecture Notes in Computer Science , pp. 325 -- 341 , 2005 . Dan B, Goh E J, Nissim K, \"Evaluating 2-DNF formulas on ciphertexts\", Lecture Notes in Computer Science, pp.325--341, 2005.","journal-title":"Lecture Notes in Computer Science"},{"key":"e_1_3_2_1_4_1","first-page":"29","volume-title":"Database encryption: an overview of contemporary challenges and design considerations","author":"Shmueli E","year":"2010","unstructured":"Shmueli E , Vaisenberg R , Elovici Y , and Glezer C , \" Database encryption: an overview of contemporary challenges and design considerations \", vol. 38 , issue 3, pp. 29 -- 34 , 2010 . Shmueli E, Vaisenberg R, Elovici Y, and Glezer C, \"Database encryption: an overview of contemporary challenges and design considerations\", vol.38, issue 3, pp. 29--34, 2010."},{"key":"e_1_3_2_1_5_1","first-page":"2561","article-title":"Cryptographic technologies enabling computation over encrypted data","volume":"09","author":"Dong Q X","year":"2016","unstructured":"Dong Q X , Guan Z , Chen Z , \" Cryptographic technologies enabling computation over encrypted data \", Application Research of Computers, No . 09 , pp. 2561 -- 2572 , 2016 . Dong Q X, Guan Z, Chen Z, \"Cryptographic technologies enabling computation over encrypted data\", Application Research of Computers, No.09, pp.2561--2572, 2016.","journal-title":"Application Research of Computers, No"},{"key":"e_1_3_2_1_6_1","first-page":"2","volume-title":"Mehrotra, \"Executing SQL over Encrypted Data in Database service\"","author":"Hacigumus H","year":"2002","unstructured":"Hacigumus H , lyer B , Mehrotra, \"Executing SQL over Encrypted Data in Database service\" , University of California , pp. 2 -- 34 , 2002 . Hacigumus H, lyer B, Mehrotra, \"Executing SQL over Encrypted Data in Database service\", University of California, pp.2--34, 2002."},{"key":"e_1_3_2_1_7_1","first-page":"10","article-title":"Executing SQL over encrypted data in the database service","author":"Hacigumus H","year":"2005","unstructured":"Hacigumus H , Bara , \" Executing SQL over encrypted data in the database service \", University of California , pp. 10 -- 23 , 2005 . Hacigumus H, Bara, \"Executing SQL over encrypted data in the database service\", University of California, pp.10--23, 2005.","journal-title":"University of California"},{"key":"e_1_3_2_1_8_1","first-page":"535","volume-title":"subset, and range queries on encrypted data\", the theory of Cryptography","author":"Boneh D","year":"2007","unstructured":"Boneh D , Waters B , \" Conjunclive , subset, and range queries on encrypted data\", the theory of Cryptography , pp. 535 -- 554 , 2007 . Boneh D, Waters B, \"Conjunclive, subset, and range queries on encrypted data\", the theory of Cryptography, pp.535--554, 2007."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"e_1_3_2_1_10_1","first-page":"17","article-title":"Research on the implementation of encryption in database","volume":"01","author":"Cui G H","year":"2000","unstructured":"Cui G H , Tang X M , \" Research on the implementation of encryption in database \", Cryptography and Information, No . 01 , pp. 17 -- 21 , 2000 . Cui G H, Tang X M, \"Research on the implementation of encryption in database\", Cryptography and Information, No.01, pp.17--21, 2000.","journal-title":"Cryptography and Information, No"},{"key":"e_1_3_2_1_11_1","first-page":"216","article-title":"Secure indexes","author":"Goh E J","year":"2003","unstructured":"Goh E J , \" Secure indexes \", IACR Cryptology ePrint Archive , pp. 216 , 2003 . Goh E J, \"Secure indexes\", IACR Cryptology ePrint Archive, pp.216, 2003.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2730227"},{"issue":"1","key":"e_1_3_2_1_13_1","first-page":"1","article-title":"Survey on lightweight hash functions","volume":"3","author":"Gong Z","year":"2016","unstructured":"Gong Z , \" Survey on lightweight hash functions \", Journal of Cryptologic Research , vol. 3 , issue. 1 , pp. 1 -- 11 , 2016 . Gong Z, \"Survey on lightweight hash functions\", Journal of Cryptologic Research, vol.3, issue.1, pp.1--11, 2016.","journal-title":"Journal of Cryptologic Research"}],"event":{"name":"CSAI2019: 2019 3rd International Conference on Computer Science and Artificial Intelligence","sponsor":["Shenzhen University Shenzhen University"],"location":"Normal IL USA","acronym":"CSAI2019"},"container-title":["Proceedings of the 2019 3rd International Conference on Computer Science and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374587.3374646","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3374587.3374646","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:45Z","timestamp":1750203885000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374587.3374646"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,6]]},"references-count":13,"alternative-id":["10.1145\/3374587.3374646","10.1145\/3374587"],"URL":"https:\/\/doi.org\/10.1145\/3374587.3374646","relation":{},"subject":[],"published":{"date-parts":[[2019,12,6]]},"assertion":[{"value":"2020-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}